(Home >> Security Center)
This section of WHM allows you to improve the security on your server.
- cPHulk Brute Force Protection — This interface allows you to configure cPHulk. cPHulk helps defend your server against brute force attacks. Brute force attack methods involve the use of an automated system to guess your web server's or services' password.
- Host Access Control — This interface allows you to allow or deny clients' access, based on their IP addresses, to specific services.
- Manage root's SSH Keys — This interface allows you to add, import, and control SSH keys on your server. The system divides your keys into public and private key sets in two separate lists.
- Manage Wheel Group Users — This interface allows you to add or remove users from the wheel group. The wheel group contains specific users who can execute the
su command, which allows the user to gain
- ModSecurity™ Tools — This interface allows you to install and manage your ModSecurity™ rules.
- PHP open_basedir Tweak — This interface allows you to configure PHP's
open_basedir directive. This tweak denies users the ability to use PHP to open files outside of their home directory.
- Security Advisor — This interface runs a security scan on your server and advises you about how to resolve any security issues that it finds.
- Security Questions — This interface allows you to define and manage security questions. The system uses security questions when an unrecognized IP address attempts to log in to your account.
- Shell Fork Bomb Protection — This interface allows you to prevent the depletion of server resources by users with terminal access (SSH or Telnet). This depletion of resources can crash your server in a malicious attack known as a fork bomb. Fork bombs start a cascade of small processes that duplicate themselves until they deplete the server's resources.
- SMTP Restrictions — This interface allows you to configure your server so that the mail transport agent (MTA), Mailman mailing list software, and
root user are the only accounts that can connect to remote SMTP servers. You may want to deny users the ability to bypass your mail server to send mail. This is common practice for spammers.
- Traceroute Enable Disable — This interface allows you to configure the
traceroute utility on your server. The
traceroute utility is a network tool that determines the route that your network traffic uses to reach its destination.